参考文献
参考文献
外文文献:
(一)著作
1.Abraham D.Sofaer,David Clark,Whitfield Diffie,Cyber Security and International Agreements,Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Opinions for U.S.Policy,the National Academies Press,2010.
2.Abraham D.Sofaer,Seymour E.Goodman,The Transnational Dimension of Cyber Crime and Terrorism,Hoover Press,2001,available at http://media.hoover.org/sites/default/files/documents/0817999825_1.pdf,visited on 29 Aug.2016.
3.Albert Marcella,Jr.Doug Menendez,Cyber Forensics A Field Manual for Collecting,Examining,and Preserving Evidence of Computer Crimes(2nd Edition),Taylor & Francis Group,2008.
4.Anoop Singhal,Data Warehousing and Data Mining Techniques for Cyber Security,Springer Science + Business Media,2007.
5.Andrew M.Colarik,Cyber Terrorism Political And Economic Implications,Idea Group Publishing,2006.
6.Ananda Mitra,Digital Security Cyber Terror and Cyber Security,Infobase Publishing,2010.
7.Babak Akhgar,Andrew Staniforth,Francesca Bosco,Cyber Crime and Cyber terrorism Investigator’s Handbook,Elsevier Press,2014.
8.Hsinchun Chen,Richard Miranda .etc,Intelligence and Security Informatics,Springer-Verlag Berlin Heidelberg,2003.
9.Igor Bernik,Cybercrime and Cyberwarfare,ISTE-Wiley,2014.
10.Czosseck and Kenneth.Geers,The Virtual Battlefield: Perspectives on Cyber Warfare,IOS Press,2009.
11.Jorg Polakiewicz,Coucil of Europe(COE),Max Plank Encyclopedia of Public International Law,from Oxford Public International law,Oxford University Press,2013.
12.Jonathan Clough,Principles of Cybercrime,Cambridge University Press,2010.
13.Lech Janczewski,Andrew M.Colarik,Managerial Guide for Handling Cyber-Terrorism and Information Warfare,Idea Group Publishing,2005.
14.Michael N.Schmitt(ed.),Tallinn Manual on the International Law Applicable to Cyber Warfare,Cambridge University Press,2013.
15.Michael N.Schmitt(ed.),Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations,Cambridge University Press,2017.
16.Martin L.Forst ,Cybercrime: Appellate Court Interpretations,available at http://biglibrary.co/download/cybercrime-appellate-court-interpretations.pdf,visited on 27 Jun.2016.
17.Nicholas Tsagourias,Russell Buchan,Research Handbook on International Law and Cyberspace,Edward Elgar Publishing,2015.
18.Panagiotis Kanellis,Digital crime and forensic science in cyberspace,Idea Group Publishing,2006.
19.Pierre Hauck,Sven Peterke,International Law and Transnational Organized Crime,Oxford University Press,2016.
20.Pramod Kr.Singh,Laws On Cyber Crimes Alongwith IT Act and Relevant Rules,Book Enclave Press,2007.
21.Susan W.Brenner,Cybercrime: Criminal Threats from Cyberspace,Praeger Press,2010.
22.William A.Owens,Kenneth W.Dam,Herbert S.Lin,Technology,Policy,Law,and Ethics Regarding U.S.Acquisition and Use of Cyberattack Capabilities,National Academies Press,2009.
23.Yaroslav Radziwill,Cyber-Attacks and the Exploitable Imperfections of International Law,Brill-Nijhoff Pess,2015.
24.Zeinab Karake Shalhoub,Lubna Al Qasimi,Cyber Law and Cyber Security in Developing and Emerging Economies,Edward Elgar Publishing,2010.
(二)论文
1.Abraham D.Sofaer,David Clark,Whitfield Diffie,Cyber Security and International Agreements,in Abraham D.Sofaer,David Clark,Whitfield Diffie,Cyber Security and International Agreements,Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Opinions for U.S.Policy,the National Academies Press,2010.
2.Abt Associates Inc.,Crime and Justice Trends in the United States During the Past Three Years,available at http://abtassociates.com/reports/CJTrendsThreeDecades.pdf,visited on 27 Nov.2020.
3.Adam Segal,Matthew Waxman,Why a Cybersecurity is A Pipe Dream,CNN Blog,27 October 2011,available at http://globalpublicsquare.blogs.cnn.com/2011/10/27/why-a-cybersecurity-treaty-is -a-pipe-dream/,visited on 28 May 2020.
4.Alexander Seger,Budapest Convention on Cybercrime,available at http://www.cto.int/media/events/pst-ev/2013/Cybersecurity/Alexander%20Seger-Budapest%20Convention%20on%20Cybercrime.pdf,visited on 24 May 2020.
5.Amelia M.Weber,The Council of Europe’s Convention on Cybercrime,Berkeley Technology Law Journal,Vol.18,2003.
6.Ammar Yassir ,Smitha Nayak,Cybercrime:A threat to Network Security,available at http://paper.ijcsns.org/07_book/201202/20120214.pdf,visited on 25 May 2020.
7.Andrew Michael Colarik,Cyber Terrorism Political And Economic Implications,Idea Group Publishing,2006.
8.Barry Collin,The Future of Cyberterrorism:Where the Physical and Virtual Worlds Converge,Crime and Justice International,Vol.13,Issue 2,1997.
9.Brian Harley,A Global Convention on Cybercrime,Columbia Science and Technology Law Review,23 Mar.2010,available at http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/,visited on 2 Dec .2020.
10.Bernardo Wahl Gonçalves de Araújo Jorge,Recent Developments of Cybersecurity and Implications to International Law Relations:Stratford Versus Anonymous,available at http://www.seer.ufrgs.br/ConjunturaAustral/article/download/27577/19475,visited on 26 May 2020.
11.Bill Laberis,20 Eye-Opening Cybercrime Statistics,available at https://securityintelligence.com/20-eye-opening-cybercrime-statistics/,visited on 2 Mar.2020.
12.C.Bryan Foltz,Cyberterrorism,Computer Crime,and Reality,Information Management & Computer Security,Vol.12,Issue.2,available at http://www.emeraldinsight.com/doi/pdfplus/10.1108/09685220410530799,visited on 29 Oct.2020.
13.Chris Hale,Cybercrime:Facts & Figures Concerning this Global Dilemma,Crime & Justice International,Vol.18,Issue 65,2002,available at http://www.cjcenter.org/cjcenter/publications/cji/archives/cji.php? id=37,visited on 19 Oct.2020.
14.Dorothy E.Denning,Activism,Hacktivism,and Cyber terrorism:The Internet as a Tool for Influencing Foreign Policy,in Networks and Netwars: The Future of Terror,Crime,and Militancy,available at http://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1382/MR1382.ch8.pdf/,visited on 18 Oct.2020.
15.Dorothy E.Denning,Cyberterrorism,available at http://palmer.wellesley.edu/~ivolic/pdf/Classes/Handouts/NumberTheoryHandouts/Cyberterror-Denning.pdf,visited on 27 Oct.2020.
16.David P.Fidler,Cyberspace,Terrorism and International Law,Journal of Conflict & Security Law,available at http://www.cfr.org/international-law/cyberspace-terrorism-international-law/p38326,visited on 27 Oct.2020.
17.David P Fidler,Recent Developments and Revelations Concerning Cybersecurity and Cyberspace:Implications for International Law,American Society of International Law Insights,Vol.16,Issue 22,2012.
18.David R.Johnson & David Post,Law and Borders-The Rise of Law in Cyberspace,Stanford Law Review,Vol.48,No.5,1996.
19.Duncan B.Hollis,Stewardship versus Sovereignty? International Law and the Apportionment of Cyberspace,available at http://ssrn.com/abstract=2038523,visited on 24 Sep.2020.
20.Ekaterina A.Drozdova,Civil Liberties and Security in Cyberspace,available at http://www.hoover.org/sites/default/files/uploads/documents/0817999825_183.pdf,visited on 13 Oct.2020.
21.Eneken Tikk-Ringas,Developments in the Field of Information and Telecommunication in the Context of International Security: Work of the UN First Committee 1998-2012,available at http://www.ict4peace.org/wp-content/uploads/2012/08/Eneken-GGE-2012-Brief.pdf,visited on 5 Dec.2020.
22.Ellen S.Podgor,Cybercrime:National,Transnational,or International,Wayne Law Review,Vol.50,2004,available at http://readingroom.law.gsu.edu/cgi/viewcontent.cgi? article=1414&context=faculty_pub,visited on 2 Dec.2020.
23.Francis Snyder,Soft Law and Insititutional Practice in the European Community,in Steve Martin(ed),The Construction of Europe-Essays in Honour of Emile Noel,Kluwer Academic Publishiers,1994,available at http://link.springer.com/chapter/10.1007%2F978-94-015-8368-8_10,visited on 16 Jan.2020.
24.Frederick Gallegos,Computer Forensics:An Overview,Information Systems Control Journal,Vol.6,2005,available at https://my.infotex.com/wp-content/uploads/2012/03/computer_forensics_overview_isaca.pdf,visited on 30 Nov.2020.
25.Fausto Pocar,New challenges for international rules against cyber-crime,European Journal on Criminal Policy and Research,Vol.10,Issue 1,2004.
26.Free Trade Commission,Adoption of Convention on Cybercrime,International Journal of International Law,Vol.95,No.4,2001.
27.Gercke Marco,The slow Wake of a Global Approach against Cybercrime : The Potential of the Council of Europe Convention on Cybercrime as International Model Law,available at http://cat.inist.fr/? aModele=afficheN&cpsidt=18214459,visited on 28 Dec.2020.
28.Georgios I. Zekos,State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction,International Journal of Law and Information Technology,Vol.15,Issue 1,2007.
29.Gregor Urbas,Yao-chung Chang,Australia’s Proposed Accession to the Council of Europe Convention on Cybercrime,14 March 2011,available at http://law.anu.edu.au/sites/all/files/lrsj/urbas_australias_proposed_accession_to_the_council_of_europe_convention_on_cybercrime_2011.pdf,visited on 23 May 2020.
30.Hamadoun Touré,Global Cybersecurity Agenda,available at http://www.itu.int/ITU-D/cyb/events/2008/sofia/docs/input-document-to-regional-cybersecurity-forum-sofia-oct-08.pdf,visited on 10 Dec.2020.
31.Harold Hongju Koh,International Law in Cyberspace,available at http://digitalcommons.law.yale.edu/fss_papers/4854/,visited on 24 Dec.2020.
32.Henrik Spang-Hanssen,The Future of International Law:Cyber Crime ,2008,available at http://papers.ssrn.com/sol3/papers.cfm? abstract_id=1090876,visited on 25 May 2020.
33.Jacob T.Jackson,Gregg H.Grunsch.etc,Blind Steganography Detection Using a Computational Immune:A Work in Progress,International Journal of Digital Evidence,Vol.4,Issue 1,2003.
34.Jack Goldsimith,Cybersecurity Treaties:A Skeptical View,Koret-Taube Task Force on National Security and Law,available at http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf,visited on 25 May 2020.
35.Jonathan Clough,A World of Difference:The Budapest Convention on Cybercrime and The Challenges of Harmonisation,Monash University Law Review,Vol.40,No 3,2014.
36.John Perry Barlow,A Cyberspace Independence Declaration,8 February 1996,available at http://w2.eff.org/Censorship/Internet_censorship_bills/barlow_0296.declaration,visited on 16 Oct.2020.
37.Joel P.Trachtman,Cyberspace,Sovereignty,Jurisdiction and Modernism,Indiana Journal of Global Legal Studies,Vol.5,No.2,1998.
38.J.P.I.A.G.Charvat,Cyber Terrorism:A New Dimension in Battlespace,in Christian.Czosseck and Kenneth.Geers,The Virtual Battlefield: Perspectives on Cyber Warfare,IOS Press,2009.
39.Kristin Finklea,Catherine A.Theohary,Cybercrime:Conceptual Issues for Congress and U.S.Law Enforcement,available at http://fas.org/sgp/crs/misc/R42547.pdf,visited on 20 May 2020.
40.Kristin Archick,Cybercrime:The Council of Europe Convention,available at http://fpc.state.gov/documents/organization/74909.pdf,visited on 24 May 2020.
41.Katharina Boele-woelki,Catherine Kessedjian,.Etc,Internet: Which Court Decides? Which Law Applies? ,Kluwer Law International,1998,available at https://searchworks.stanford.edu/view/4004920,visited on 24 May 2020.
42.Kevin Soo Hoo,Seymour Goodman,and Lawrence Greenberg,Information Technology and the Terrorist Threat,Survival,Vol.39,No.3,1997.
43.Katherine Ognyanova,Careful What You Say:Media Control in Putin’s Russia–Implications for Online Content,International Journal of E-Politics,Vol.1,Issue 2,2010.
44.Mark M.Politt,Cyberterrorism—Fact or Fancy,Computer Fraud & Security,Vol.1998,Issue 2,1998.
45.Marc D.Goodman,Susan W.Brenner,The Emerging Consensus on Criminal Conduct in Cyberspace,UCLA Journal of Law and Technology,Vol.6,Issue 1,2002.
46.Maskun,Alma Manuputty etc.,Legal’s Standing of Cyber Crime in International Law Contemporary,available at http://www.iiste.org/Journals/index.php/JLPG/article/download/11056/11357,visited on 22 May 2020.
47.Miriam F.Miquelon-Weismann,The Convention on Cybercrime:A Harmonized Implementation of International Penal Law:What Prospects for Procedural Due Process,Journal of Computer & Information Law,Vol.23,Issue 2,2005.
48.Michael A.Vatis,The Council of Europe Convention on Cybercrime,in Abraham D.Sofaer,David Clark,Whitfield Diffie,Cyber Security and International Agreements,Proceedings of a Workshop on Deterring Cyber Attacks: Informing Strategies and Developing Opinions for U.S.Policy,the National Academies Press,2010.
49.Mike Keyser,The Council of Europe Convention on Cybercrime,Journal of Transnational Law & Policy,Vol.12,No.2,2003.
50.Mohamed Chawki,Cybercrime in France:An Overview,2005,available at http://www.crime-research.org/articles/cybercrime-in-france-overview/,visited on 19 Oct.2020.
51.Monika Ermert,WSIS+10: Roles,Responsibilities Remain Hot; Cybersecurity Treaty Demanded By Many States,available at https://www.ip-watch.org/2015/12/16/wsis10-roles-responsibilities-remain-hot-cybersecurity-treaty-demanded-by-many-states/,visited on14 Mar.20120.
52.Murdoch Watney,Evaluation of Cybercrime Regulation in South Africa ,available at http://www.lex-informatica.org/Evaluation%20of%20Cybercrime%20Regulation%20in%20South%20Africa.pptx,visited on 23 May 2020.
53.Murdoch Watney,Cybercrime regulation at a cross-road:State and Transnational laws Versus Global Laws,available at https://www.researchgate.net/publication/228492413_The_Council_of_Europe's_Cyber_Crime_Treaty_An_exercise_in_Symbolic_Legislation,visited on 25 May 2020.
54.Mu’azu Abdullahi Saulawa,Cyber Pornography:An Analysis of the Legal Framework,Global Journal of Politics and Law Research Vol.3,No.2,2015.
55.Nancy E.Marion,The Council of Europe’s Cyber Crime Treaty:An exercise in Symbolic Legislation,International Journal of Cyber Criminology,Vol.4,Issue 1&2,2010.
56.Namosha Veerasamy,Towards a Conceptual Framework for Cyberterrorism,available at http://researchspace.csir.co.za/dspace/bitstream/10204/3335/1/Veerasamy_2009.pdf ,visited on 29 Oct.2020.
57.Net Losses,Estimating the Global Cost of Cybercrime,Economic impact of cybercrime II,available at http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf,visited on 11 Dec.2020.
58.Robert Moore,To View or Not to View:Examining the Plain View Doctrine and Digital Evidence,available at http://download.springer.com/static/pdf/294/art%253A10.1007%252FBF02885704.pdf? originUrl=http%3A%2F%2Flink.springer.com%2Farticle%2F10.1007%2FBF02885704&token2=exp=1482929531~acl=%2Fstatic%2Fpdf%2F294%2Fart%25253A10.1007%25252FBF02885704.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Farticle%252F10.1007%252FBF02885704*~hmac=8a96fb15967e2fbc39f335e86b762c551d639b512d9baabcd4ffc89af9ba7732,visited on 28 Dec.2020.
59.Ryan M.F.Baron,A Critique of the International Cybercrime Treaty,Common Law Conspectus,Vol.10,2002,available at http://scholarship.law.edu/cgi/viewcontent.cgi? article=1246&context=commlaw&sei-redir=1&referer=http%3A%2F%2Fcn.bing.com%2Fsearch%3Fq%3DA%2BCritique%2Bof%2Bthe%2BInternational%2BCybercrime%2BTreaty%26go%3D%25E6%2590%259C%25E7%25B4%25A2%26qs%3Dn%26form%3DQBRE%26sp%3D-1%26pq%3Da%2Bcritique%2Bof%2Bthe%2Binternational%2Bcybercrime%2Btreaty%26sc%3D0-49%26sk%3D%26cvid%3DCF730E4E39FC49E49E33139B2744AAEC#search=%22Critique%20International%20Cybercrime%20Treaty%22,visited on 2 Dec.2020.
60.Roderic Broadhurst,Development in the Global Law Enforcement of Cyber-crime,Policing: An International Journal of Police Strategies and Management,Vol.29,Issue 3,2006.
61.Ryan Pidanick,An Investigation of Computer Forensics,Information Systems Control Journal,Volum 3,2004,available at http://repository.binus.ac.id/2009-2/content/A0452/A045273773.pdf,visited on 30 Nov.2020.
62.Shamsuddin Abdul Jalil,Countering Cyber Terrorism Effectively:Are We Ready to Rumble? ,available at https://www.giac.org/paper/gsec/3108/countering-cyber-terrorism-effectively-ready-rumble/105154,visited on 16 Oct.2020.
63.Stein Schjolberg,The History of Global Harmonization on Cybercrime Legislation-The Road to Geneva,available at http://www.cybercrimelaw.net/documents/cybercrime_history.pdf,visited on 23 May 2020.
64.Shannon L.Hopkins,Cybercrime Convention:A Positive Beginning to a Long Road ahead,Journal of High Technology Law,Vol.2 ,No.1,2003.
65.Stewart Baker,Going Wobbly on Russia’s Cybersecurity Disarmament Proposal,available at http://www.volokh.com/2010/06/06/going-wobbly-on-russias-cybersecurity-disarmament-proposal/,visited on 22 May 2020.
66.Sylvia Mercado Kierkegaard,Cracking Down On Cybercrime Global Response:The Cybercrime Convention,available at http://www.iima.org/CIIMA/CIIMA%205.1%2059%20Kirkegaard-7.pdf,visited on 20 May 2020.
67.Susan W.Brenner,Cybercrime Metrics:Old Wine,New Bottles? ,Virginia Journal of Law and Technology,Vol.9,2004,available at http://www.vjolt.net/vol9/issue4/v9i4_a13-Brenner.pdf,visited on 25 Oct.2020.
68.S.Gordon,R.Ford,On the Definition and Classification of Cybercrime,Journal in Computer Virology,Vol.2,No.1,2006.
69.Uchenna Jerome Orji,Multilateral Legal Responses to Cyber Security in Africa:Any Hope for Effective International Cooperation,available at https://ccdcoe.org/cycon/2015/proceedings/08_orji.pdf,visited on 3 June 2020.
70.Vincy Fon,Francesco Parisi,The Formation of International Treaties,Review of Law and Economics,Vol.3,2007,available at https://papers.ssrn.com/sol3/papers.cfm? abstract_id=819524,visited on 6 Dec.2020.
71.William Hague,Foreign Secretary William Hague spoke at the end of the London Conference on Cyberspace on 2 November,available at https://www.gov.uk/government/speeches/foreign-secretarys-closing-remarks-at-the-london-conference-on-cyberspace,visited on 24 May 2020.
72.Weiping Chang,Wingyan Chung.etc,An International Perspective on Fighting Cybercrime,in Hsinchun Chen,Richard Miranda .etc,Intelligence and Security Informatics,Springer-Verlag Berlin Heidelberg,2003.
(三)其他文献
1.AU,African Union Convention on Cyber Security and Personal Data Protection Draft,available at http://pages.au.int/sites/default/files/en_AU%20Convention%20on%20CyberSecurity%20Pers%20Data%20Protec%20AUCyC%20adopted%20Malabo.pdf,visited on 3 June 2020.
2.CIS,The Commonwealth of Independent States Agreement on Cooperation in Combating Offences related to Computer Information,available at https://cms.unov.org/documentrepositoryindexer/GetDocInOriginalFormat.drsx? DocID=5b7de69a-730e-43ce-9623-9a103f5cabc0,visited on 2 Jan.2020.
3.COE,Convention on Cybercrime,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=0900001680081561,visited on 23 May 2020.
4.COE,Explanatory report to the Convention on Cybercrime,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=09000016800cce5b,visited on 15 Oct.2020.
5.COE,Additional Protocol to the Convention on Cybercrime,Concerning the Criminalisation of Acts of A Racist and Xenophobic Nature Committed through Computer Systems,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=090000168008160f,visited on 16 Nov.2020.
6.COE,Recommendation No.R.(89) 9 of the Committee of Ministers to Member States on Computer-related Crime,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=09000016804f1094#search=Recommendation%20No%2E%20R%2E%20%2889%29%209%20of%20the%20Committee%20of%20Ministers%20to%20Member%20States%20on%20Computer%2Drelated%20Crime,visited on 23 May 2020.
7.COE,Chart of signatures and ratifications of the Convention on Cybercrime,available at http://conventions.coe.int/Treaty/Commun/ChercheSig.asp? NT=185&CM=&DF=&CL=ENG,visited on 27 May 2020.
8.COE,Chart of signatures and ratifications of Treaty 185,available at https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures,visited on 3 Jan.2020.
9.COE,Summary of the EU/COE Joint Project on Global Action on Cybercrime(GLACY),available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/GLACY/2688_GLACY_summary_v4.pdf,visited on 24 May 2020.
10.COE,C-PROC activity report for the period April 2014—September 2015,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=090000168047d1b8,visited on 22 May 2020.
11.COE,Summary of the Convention on Cybercrime.(ETS No.185),available at http://ftp.freenet.at/privacy/gesetze/europarat-cybercrime-summary.pdf,visited on 23 May 2020.
12.COE,Statute of the Council of Europe,available at http://assembly.coe.int/nw/xml/RoP/Statut_CE_2015-EN.pdf,visited on 6 Dec.2020.
13.Council for Security Cooperation in the Asia Pacific(CSCAP),CSCAP Memorandum NO.20—Ensuring a Safer Cybersecurity Environment,available at http://www.cscap.org/uploads/docs/Memorandums/CSCAP%20Memorandum%20No%2020%20—%20Ensuring%20a%20Safer%20Cyber%20Security%20Environmenet.pdf,visited on 24 May 2020.
14.Commonwealth of Independent States,Agreement on Cooperation among the States Members of the Commonwealth of Independent States in Combating Offences Relating to Computer Information,available at https://cms.unov.org/documentrepositoryindexer/GetDocInOriginalFormat.drsx? DocID=5b7de69a-730e-43ce-9623-9a103f5cabc0,visited on 3 June 2020.
15.Computer Crime and Intellectual Property Section,US Department of Justice,The National Information Infrastructure Protection Act of 1996,Legislative Analysis(1996),available at: http://www.irational.org/APD/CCIPS/1030_anal.html,visited on 25 May.2020.
16.Conference Report of International Conference on Cyberlaw,Cybercrime and Cybercurity,Organized an New Delhi,India on 20th Nobember,2014,available at https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/Report%202014%20-%20INTERNATIONAL%20CONFERENCE.pdf,visited on 25 May 2020.
17.CRS,Botnets,Cybercrime,and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,2007,available at http://www.fas.org/sgp/crs/terror/RL32114.pdf,visited on 25 May.2020.
18.CRISP,CISAC,Draft International Convention to Enhance Protection from Cyber Crime and Terrorism,available at http://web.stanford.edu/~gwilson/Transnatl.Dimension.Cyber.Crime.2001.p.249.pdf,visited on 25 Jun.2020.
19.Discussion Guide to the Eleventh United Nations Congress on Crime Prevention and Criminal Justice,2003,A/CONF.203/RM.1,available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/V03/904/51/PDF/V0390451.pdf? OpenElement,visited on 10 Dec.2020.
20.European Commission,EU Cybersecurity Plan to Protect Open Internet and Online Freedom and Opportunity,available at http://europa.eu/rapid/press-release_IP-13-94_en.htm,visited on 26 May 2020.
21.ECOWAS,ECOWAS Directive C/DIR.1/08/11 on Fighting Cybercrime,1 Aug.2011,available at https://ccdcoe.org/sites/default/files/documents/ECOWAS-110819-FightingCybercrime.pdf,visited on 3 June 2020.
22.International Law Commission,Report on the work of the sixty-sixth session(2014),para.131,available at http://legal.un.org/docs/? path=../ilc/reports/2014/english/chp9.pdf&lang=EFSRAC,visited on 19 Mar.2020.
23.IIP Digital,Vice President Biden’s Speech to London Conference on Cyberspace,1 November 2011,available at http://iipdigital.usembassy.gov/st/english/texttrans/2011/11/20111101180602su0.4332653.html#axzz30ddat8lM,visited on 26 May 2020.
24.ITU,ITU/UNODC,available at http://www.itu.int/en/ITU-D/Cybersecurity/Pages/UNODC.aspx,visited on 11 Dec.2020.
25.ITU,ITU Toolkit for Cybercrime Legislation,available at http://www.cyberdialogue.ca/wp-content/uploads/2011/03/ITU-Toolkit-for-Cybercrime-Legislation.pdf,visited on 29 Dec.2020.
26.ITU,Understanding Cybercrime: A Guide for Developing Countries,April 2009,available at https://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITU_Guide_A5_12072011.pdf,visited on 28 Dec.2020.
27.Indo-Asian News Service,India Urges Global Convention to Fight Cybercrime,16 Dec.2015,available at http://gadgets.ndtv.com/internet/news/india-urges-global-convention-to-fight-cybercrime-778814,visited on 5 Dec.2020.
28.Kofi Annan International Peacekeeping Training Centre,Workshop on Harmonizing Cyberlaw in the ECOWAS region,available at http://www.snailattorneys.com/wp-content/uploads/2013/11/accra-lecture-18-21-march-2014.pdf,visited on 3 June 2020.
29.League of Arab States General Secretariat,Arab Convention on Combating Information Technology Offences,available at https://cms.unov.org/DocumentRepositoryIndexer/GetDocInOriginalFormat.drsx? DocID=3dbe778b-7b3a-4af0-95ce-a8bbd1ecd6dd,visited on 3 June 2020.
30.Meriem Slimani,Enhancing Cyber Security in Africa: New Challenges for Regional Organizations,available at http://www.itu.int/en/ITU-T/Workshops-and-Seminars/cybersecurity/Documents/PPT/S3P2_Meriem_Slimani.pdf,visited on 2 Jan.2020.
31.NATO Cooperative Cyber Defence Centre of Excellence,International Cyber Developments Report(INCYDER),30 April 2014,available at https://www.ccdcoe.org/publications/articles/INCYDER-2014Q1.pdf,visited on 26 May 2020.
32.Norton,Norton Cybersecurity Insight Report,available at http://us.norton.com/norton-cybersecurity-insights-report-global,visited on 2 June 2020.
33.OECD,Spam Issues in Developing Countries,DSTI/CP/ICCP/SPAM(2005)6/FINAL,2005.
34.Paisley Dodds,U.S.Says No New Cybersecurity Treaty Needed,available at http://www.rdmag.com/news/2011/06/us-says-no-new-cybersecurity-treaty-needed,visited on 28 May 2020.
35.Shanghai Organization of Cooperation,The Agreement between the Governments of State Members of the Shanghai Organization of Cooperation about Cooperation in the Field of Ensuring the International Information Security,June 16,2009,available at https://ccdcoe.org/sites/default/files/documents/SCO-090616-IISAgreement.pdf,visited on 3 June 2020.
36.Seoul Conference on Cyberspace 2013,Seoul Framework for and Commitment to Open and Secure Cyberspace,available at http://www.mofat.go.kr/english/visa/images/res/SeoulFramework.pdf,visited on 24 Sep.2020.
37.Twelfth United Nations Congress on Crime Prevention and Criminal Justice,Report of Committee II on Agenda Item 8 and Workshop 2,April 12-19,2010,available at http://www.un.org/zh/documents/view_doc.asp? symbol=A/CONF.213/L.4/ADD.1&referer=http://www.un.org/zh/conf/crimecongress2010/documents.shtml&Lang=E,visited on 4 Dec.2020.
38.Twelfth United Nations Congress on Crime Prevention and Criminal Justice,Report of the Latin American and Caribbean Regional Preparatory Meeting for the twelfth United Nations Congress on Crime Prevention and Criminal Justice,held in San Jose from 25 to 27 May 2009,A/CONF.213/RPM.1/1,Conclusions and Recommendations,available at http://www.un.org/zh/documents/view_doc.asp? symbol=A/CONF.213/RPM.1/1,visited on 9 Dec.2020.
39.Twelfth United Nations Congress on Crime Prevention and Criminal Justice,Report of the Western Asian Regional Preparatory Meeting for the twelfth United Nations Congress on Crime Prevention and Criminal Justice,held in Doha from 1 to 3 June 2009,A/CONF.213/RPM.2/1,available at http://www.un.org/zh/documents/view_doc.asp? symbol=A/CONF.213/RPM.2/1,visited on 9 Dec.2020.
40.Twelfth United Nations Congress on Crime Prevention and Criminal Justice,Report of the Asian and Pacific Regional Preparatory Meeting for the twelfth United Nations Congress on Crime Prevention and Criminal Justice,held in Bangkok from 1 to 3 July 2009,A/CONF.213/RPM.3/1,available at http://www.un.org/zh/documents/view_doc.asp? symbol=A/CONF.213/RPM.3/1,visited on 9 Dec.2020.
41.Twelfth United Nations Congress on Crime Prevention and Criminal Justice,Report of the Western Asian Regional Preparatory Meeting for the Eleventh United Nations Congress on Crime Prevention and Criminal Justice,A/CONF.2003/RPM.4/1,available at https://documents-dds-ny.un.org/doc/UNDOC/GEN/V04/532/48/PDF/V0453248.pdf? OpenElement,visited on 9 Dec.2020.
42.Twelfth United Nations Congress on Crime Prevention and Criminal Justice,Report of the African Regional Preparatory Meeting for the twelfth United Nations Congress on Crime Prevention and Criminal Justice,held in Nairobi from 8 to 10 September 2009,A/CONF.213/RPM.4/1,available at http://www.un.org/zh/documents/view_doc.asp? symbol=A/CONF.213/RPM.4/1,visited on 9 Dec.2020.
43.T-CY,About T-CY,available at http://www.coe.int/en/web/cybercrime/tcy,visited on 9 Dec 2020.
44.T-CY,T-CY Assessment Report: The Mutual Legal Assistance Provisions of the Budapest Convention on Cybercrime,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=09000016802e726c,visited on 22 Nov.2020.
45.T-CY,Work Plan for the Period 1 January 2014 – 31 December 2015 Adopted at the 10th Plenary(2-3 December 2013),available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=0900001680473d79#search=Work%20Plan%20for%20the%20period%201%20January%202014%20%E2%80%93%2031%20December%202015%20Adopted%20at%20the%2010th%20Plenary%20%282%2D3%20December%202013%29%2C,visited on 9 Dec 2020.
46.T-CY,2nd Multilateral Consultation of the Parties,13 and 14 June 2007,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/T-CY%20(2007)%2003%20E.pdf,visited on 29 Dec.2020.
47.T-CY,T-CY Guidance Note #11(DRAFT) Aspects of Terrorism Covered by the Budapest Convention,available at https://rm.coe.int/CoERMPublic CommonSearchServices/DisplayDCTMContent? documentId=09000016806ab61b,visited at 23 Nov.2020.
48.T-CY,Criteria and Procedures for Accession to the Budapest Convention on Cybercrime-Update,28 May.2012,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY%202013/TCY_2012_12_E_accessprocedure.pdf,visited on 6 Dec.2020.
49.T-CY,T-CY Guidance Note #3 Transborder Access to Data,Draft Prepared by the Bureau for Discussion by the T-CY,5 November 2013,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/Guidance_Notes/T-CY(2013)7REV_GN3_transborder_V11.pdf,visited on 15 Dec.2020.
50.T-CY,Assessing Implementation of the Budapest Convention on Cybercrime—Questionnaire on International Cooperation,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=09000016802e7231,visited on 20 May 2020.
51.T-CY,Abridged meeting report,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY%202013/TCY_2012_14E_PlenAbrMeetRep.pdf,visited on 21 May 2020.
52.T-CY,T-CY Rules of Procedure,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY%202013/T-CY(2013)25%20rules_v15.pdf,visited on 23 May 2020.
53.T-CY,T-CY Work Plan for the Period 1 January 2014 — 31 December 2015,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY%202013/T-CY(2013)24%20workplan%202014-15_v7adopted.pdf,visited on 24 May 2020.
54.T-CY,Assessment report Implementation of the Preservation Provisions of the Budapest Convention on Cybercrime Supplementary Report,available at https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent? documentId=090000168044be2b,visited on 29 Oct.2020.
55.T-CY,Information Document concerning the Opinion of the Committee of Experts on Terrorism(CODEXTER) on Cyberterrorism and Use of Internet for Terrorist Purposes,available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/T-CY%20(2008)%20INF%2002%20E.pdf,visited on 21 May 2020.
56.The Commission on Crime Prevention and Criminal Justice,Strengthening international cooperation to combat cybercrime,available at https://www.unodc.org/documents/commissions/CCPCJ/Crime_Resolutions/2010-2019/2013/CCPCJ/Resolution_22-7.pdf,visited on 14 Mar.2020.
57.UN,A/RES/2749(XXV),available at https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/348/82/IMG/NR034882.pdf? OpenElement,visited on 22 Dec.2020.
58.UN,A/RES/2750(XXV),available at https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/348/83/IMG/NR034883.pdf? OpenElement,visited on 22 Dec.2020.
59.UN,A/RES/34/68,available at https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/374/61/IMG/NR037461.pdf? OpenElement,visited on 22 Dec.2020.
60.UN,A/RES/1348(XIII),available at http://www.un.org/ga/search/view_doc.asp? symbol=A/RES/1348(XIII) ,visited on 22 Dec.2020.
61.UN,A/RES/2222(XXI),available at https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/783/24/IMG/NR078324.pdf? OpenElement,visited on 22 Dec.2020.
62.UN,A/66/ 359,available at https://daccess-ods.un.org/TMP/3196734.18998718.html,visited on 13 Dec.2020.
63.UN,UN Manual on the Prevention and Control of Computer-Related Crime,available at http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/CompCrims_UN_Guide.pdf,visited on 21 Dec.2020.
64.UN,A/RES/55/63,available at http://www.un.org/zh/ga/55/res/a55r63.htm,visited on 21 Dec.2020.
65.UN,A/RES/56/121,available at http://www.itu.int/ITU-D/cyb/cybersecurity/docs/UN_resolution_56_121.pdf,visited on 10 Dec.2020.
66.UN,A/RES/65/232,available at http://www.un.org/en/ga/search/view_doc.asp? symbol=A/RES/65/232,visited on 10 Dec.2020 .
67.UNODC,Open-ended Intergovernmental Expert Group to Conduct a Comprehensive Study of the Problem of Cybercrime,available at https://www.unodc.org/unodc/en/organized-crime/expert-group-to-conduct-study-cybercrime-feb-2013.html,visited on 21 Dec.2020.
68.UNODC,UNODC and ITU Join Forces to Make the Internet Safer,available at www.unodc.org/unodc/en/frontpage/2011/May/unodc-and-itu-to-cooperate-more-closely-to-make-the-internet-safer.html,visited on 10 Dec.2020.
69.UNODC,Comprehensive Study on Cybercrime,February 2013,available at http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf,visited on 29 May 2020.
70.UNODC,The Use of the Internet for Terrorist Purposes,2012,available at https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf,visited on 29 May 2020.
71.United Nations Counter—Terrorism Implementation Task Force Working Group,Report on Countering the Use of the Internet for Terrorist Purposes,2009,available at http://www.un.org/en/terrorism/ctitf/pdfs/wg6-internet_rev1.pdf,visited on 29 May 2020.
72.UN,United Nations Manual on the Prevention and Control of Computer-Related Crime,available at http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/CompCrims_UN_Guide.pdf,visited on 28 Dec.2020.
73.UN,A/66/ 359,p.3,available at https://daccess-ods.un.org/TMP/3196734.18998718.html,visited on 13 Dec.2020.(https://www.daowen.com)
74.UN,Global Commons,available at http://unstats.un.org/unsd/environmentgl/gesform.asp? getitem=573.OECD,Global Commons,available at http://stats.oecd.org/glossary/detail.asp? ID=1120,visited on 27 May 2020.
75.UK,Computer Misuse Act 1990,available at http://www.legislation.gov.uk/ukpga/1990/18/contents,visited on 27 May.2020.
76.UK,Terrorism Act of 2000,available at http://www.legislation.gov.uk/ukpga/2000/11/section/1,visited on 23 Oct.2020.
77.US-CERT,Computer Forensics,available at https://www.us-cert.gov/sites/default/files/publications/forensics.pdf,visited on 30 Nov.2020.
78.Unnamed web,History of Computer Crime,available at http://www.personal.psu.edu/users/j/m/jms6423/Engproj/History%20of%20Computer%20Crime.xhtml,visited on 19 May.2020.
79.World Wide Web Consortium,A Framework for Global Electronic Commerce,available at http://www.w3.org/TR/NOTE-framework-970706.html,visited on 29 Oct.2020.
80.World Economic Forum,The Global Risks Report 2016,available at http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf,visited on 2 Mar.2020.
81.WSIS,WSIS Geneva Plan of Action,2003,available at http://www.itu.int/net/wsis/docs/geneva/official/poa.html,visited on 7 Dec.2020.
82.WSIS,WSIS Tunis Agenda for the Information Society,2005,available at http://www.itu.int/net/wsis/docs2/tunis/off/6rev1.html,visited on 7 Dec.2020.
中文文献:
(一)著作
2.陈雷:《反腐败国际合作理论与实务》,中国检察出版社2012年版。
3.崔莹、陈昱:《计算机网络犯罪及案例分析》,中国人民公安大学出版社2008年版。
4.崔华强:《网络隐私权利保护之国际私法研究》,中国政法大学出版社2012年版。
5.邓国良:《网络安全与网络犯罪》,法律出版社2015年版。
6.[德]卡尔·拉伦茨:《法学方法论》,陈爱娥译,商务印书馆2015年版。
7.古祖雪、柳磊:《国际通信法律制度研究》,法律出版社2014年版。
8.高格:《定罪与量刑》,中国方正出版社2001年版。
9.黄风:《国际刑事司法合作的规则和实践》,北京大学出版社2008年版。
10.黄风:《中国引渡制度研究》,中国政法大学出版社1997年版。
11.黄风:《引渡问题研究》,中国政法大学出版社2006年版。
12.[荷]格劳秀斯:《战争与和平法》,何勤华等译,上海人民出版社2005年版。
13.何家弘主编:《电子证据法研究》,法律出版社2002年版。
14.季静:《新型网络犯罪问题研究》,中国检察出版社2012年版。
15.[英]J.G.梅里尔斯:《国际争端解决(第五版)》,韩秀丽、李燕纹等译,法律出版社2011年版。
16.江国青:《国际法》,高等教育出版社2013年版。
17.贾宇:《国际刑法学》,中国政法大学出版社2004年版。
18.贾冰冰:《国际公法:和平时期的解释和适用》,清华大学出版社2015年版。
19.刘亚军:《引渡新论——以国际法为视角》,吉林人民出版社2004年版。
20.江河:《国际法的基本范畴与中国的实践传统》,中国政法大学出版社2014年版。
21.简基松:《恐怖主义犯罪之刑法与国际刑法控制》,国家行政学院出版社2012年版。
22.蒋平:《计算机犯罪问题研究》,商务印书馆2000年版。
23.马进保:《国际犯罪与国际刑事司法协助》,法律出版社1999年版。
24.马德才:《国际法中的引渡原则研究》,中国政法大学出版社2014年版。
25.[美]M.谢立夫·巴西奥尼:《国际刑法导论》,赵秉志、王文华译,法律出版社2006年版。
26.[美]安东尼·雷耶斯:《网络犯罪侦查:在安全专家、执法人员和检察官之间架起沟通的桥梁》,李娜等译,中国人民公安大学出版社2015年版。
27.[美]Marjie T.Britz:《计算机取证与网络犯罪导论》,戴鹏、周雯等译,电子工业出版社2016年版。
28.美国国家情报委员会:《大趋势——2010年的世界》,华东师范大学出版社2007年版。
29.皮勇:《网络犯罪比较研究》,中国人民公安大学出版社2005年版。
30.皮勇:《网络安全法原论》,中国人民公安大学出版社2008年版。
31.皮勇:《刑事诉讼中的电子证据规则研究》,中国人民公安大学出版社2005年版。
32.彭峰:《引渡原则研究》,知识产权出版社2008年版。
33.潘抱存、潘宇昊:《中国国际法理论新发展》,法律出版社2010年版。
34.乔雄兵:《域外取证的国际合作研究——以〈海牙取证公约〉为视角》,武汉大学出版社2010年版。
35.秦一禾:《犯罪人引渡诸原则研究》,中国人民公安大学出版社2007年版。
36.曲伶俐:《刑法修正案(七)网络犯罪实务研究》,中国人民公安大学出版社2010年版。
37.齐爱民、刘颖主编:《网络法研究》,法律出版社2003年版。
38.阮传胜:《恐怖主义犯罪研究》,北京大学出版社2007年版。
39.孙晓东主编:《网络犯罪侦查》,清华大学出版社2014年版。
40.邵沙平:《国际刑法学》,武汉大学出版社2005年版。
41.孙景仙、安永勇:《网络犯罪研究》,知识产权出版社2006年版。
42.司法部司法协助外事司、司法部司法协助交流中心编:《双边引渡条约规则概览》,中国方正出版社2006年版。
43.王铁崖:《国际法》,法律出版社1997年版。
44.王立梅、刘浩阳:《电子数据取证基础研究》,中国政法大学出版社2016年版。
45.杨正鸣:《网络犯罪研究》,上海交通大学出版社2004年版。
46.杨正鸣:《转型社会与犯罪问题研究》,复旦大学出版社2014年版。
47.于冲等:《域外网络法律译丛·刑事法卷》,中国法制出版社2015年版。
48.于冲:《网络刑法的体系构建》,中国法制出版社2016年版。
49.郭旨龙等:《信息时代犯罪定量标准的体系化构建》,中国法制出版社2013年版。
50.郭旨龙等:《网络犯罪公约的修正思路》,中国法制出版社2016年。
51.郑毅:《网络犯罪及相关问题研究》,武汉大学出版社2014年版。
52.张巍:《涉网络犯罪相关行为刑法规制研究》,法律出版社2015年版。
53.张明楷:《刑法学》,法律出版社2007年版。
54.张明楷:《刑法原理》,商务印书馆2011年版。
55.张智辉:《国际刑法通论》,中国政法大学出版社1999年版。
56.张家栋:《恐怖主义论》,时事出版社2007年版。
57.张旭:《国际刑法论要》,吉林大学出版社2000年版。
58.张筱薇:《新型国际犯罪研究》,法律出版社2012年版。
59.赵秉志:《刑法》,高等教育出版社2012年版。
(二)论文
1.阿维德·帕多:《谁来控制海底?》,载《外交季刊》1968年10月号。
2.陈兴良:《犯罪主体的消解——一个学术史的考察》,载《环球法律评论》2011年第1期。
3.陈兴良:《构成要件论:从贝林到特拉伊宁》,载《比较法研究》2011年第4期。
4.陈开琦:《计算机犯罪定义之我见》,载《现代法学》1992年第10期。
5.崔聪聪、巩珊珊:《全球网络安全与犯罪公约制定的基本问题》,载《重庆邮电大学学报》2015年第1期。
6.崔明轩:《建立统一协调的全球性打击网络犯罪合作框架——关于法律变化必要性的解释与实践》,载《犯罪研究》2016年第2期。
7.邓烈:《主权理论与近代国家》,载《读书》2009年第9期。
8.邓华:《国家官员外国刑事管辖豁免问题最新进展述评》,载《国际法研究》2016年第4期。
9.冯洁菡:《浅析〈罗马规约〉中的豁免规则——以巴希尔案为视角》,载《法学评论》2013年第3期。
10.付晓雅:《论网络犯罪的几个问题》,载《刑法论丛》2015年第3卷。
11.方祥生:《治理网络犯罪,加强国际合作》,载《光明日报》2013年4月27日。
12.冯晓青:《试论著作权限制之正当性》,载《湘潭大学学报》2007年第3期。
13.黄志雄:《网络主权:开启网络空间的“威斯特伐利亚时代”?》,载《2015年国际法年会论文集》2015年5月。
14.黄志雄:《2011年“伦敦进程”与网络安全国际法的未来走向》,载《法学评论》2013年第4期。
15.黄志雄:《论间谍活动的国际法规制——兼评2014年美国起诉中国军人事件》,载《当代法学》2015年第1期。
16.黄志雄:《关注网络安全的现状与问题》,载《人民法院报》2013年9月13日,第007版。
17.黄志雄:《反恐怖主义:国际法的发展与挑战》,载《法学杂志》2000年第11期。
18.何志鹏:《主权豁免的中国立场》,载《政法论坛》2015年第3期。
19.何志鹏、尚杰:《国际软法的效力、局限及完善》,载《甘肃社会科学》2015年第2期。
20.侯嘉斌:《网络主权维护的法理挑战与制度完善》,载《人民论坛》2013年第36期。
21.胡健生、黄志雄:《打击跨国网络犯罪国际法机制的困境与前景——以欧洲委员会〈网络犯罪公约〉为视角》,载《国际法研究》2016年第6期。
22.胡红梅、谢俊:《网络犯罪的国际治理何去何从》,http://www.cac.gov.cn/2014-08/29/c_1112282751.htm,访问日期:2020年11月7日。
23.韩晓明:《东盟地区论坛网络安全研讨会在京举行》,载《人民日报》2013年9月12日,第21版。
24.刘守芬、孙晓芳:《论网络犯罪》,载《北京大学学报(哲学社会科学版)》2001年第3期。
25.刘优良:《网络恐怖主义对公共信息安全的挑战与对策》,载《湖南大学学报》2007年第1期。
26.刘强:《网络恐怖主义的特性、现状及发展趋势》,载《世界经济与政治论坛》2004年第4期。
27.赖早兴、董丽君:《网络犯罪及其法律控制》,载《当代法学》2000年第5期。
28.卢建平:《知识产权犯罪门槛的下降及其意义》,载《政治与法律》2008年第7期。
29.李怀胜:《三代网络环境下网络犯罪的时代演变及其立法展望》,载《法学论坛》2015年第4期。
30.李恒阳:《“斯诺登事件”与美国网络安全政策的调整》,载《外交评论》2014年第6期。
31.李彦:《网络空间国际法地位问题研究》,载《武大国际法评论》2016年第2期。
32.李彦:《网络空间国际法发展路径问题探析——以海洋、空气空间和外空国际法的发展路径为切入点》,载《理论月刊》2016年第9期。
33.刘杨钺、杨一心:《网络空间“再主权化”与国际网络治理的未来》,载《国际论坛》2013年第6期。
34.李丽辉:《试论软法的理论生成及其应用》,《国外社会科学》2010年第2期。
35.孟传香:《关于网络犯罪国际刑事管辖权的思考》,载《重庆邮电大学学报》2011年第5期。
36.[美]蒂姆·毛瑞尔:《联合国网络规范的出现:联合国网络安全活动分析》,曲甜、王艳译,第19页,http://carnegieendowment.org/files/full_piece_.pdf,访问日期:2020年11月5日。
37.欧锦雄:《犯罪的定义对犯罪构成边界之限制——以我国四要件体系与德、日等国三阶层体系相比较为例的分析》,载《法商研究》2016年第2期。
38.皮勇:《〈网络犯罪公约〉中的证据调查制度与我国相关刑事程序法比较》,载《中国法学》2003年第4期。
39.皮勇:《我国网络犯罪刑法立法研究——兼论我国刑法修正案(七)中的网络犯罪立法》,载《河北法学》2009年第6期。
40.皮勇:《网络恐怖活动犯罪及其整体法律对策》,载《环球法律评论》2013年第1期。
41.皮勇:《全球化信息化背景下我国网络恐怖活动及其犯罪立法研究——兼评我国〈刑法修正案(九)(草案)〉和〈反恐怖主义法(草案)〉相关反恐条款》,载《政法论丛》2015年第1期。
42.皮勇:《论网络恐怖活动犯罪及对策》,载《武汉大学学报》2004年第5期。
43.庞仕平、崔彬:《国际恐怖主义犯罪研究》,载《法学杂志》2003年第3期。
44.屈学武:《因特网上的犯罪及其遏制》,载《法学研究》2000年第4期。
45.任明艳:《互联网背景下对国家主权的思考》,载《时代法学》2006年第4卷第6期。
46.宋玉萍:《全球化与全球治理——以欧洲委员会〈网络犯罪公约〉为例》,载《新疆社会科学》2013年第1期。
47.唐岚:《网络恐怖主义:安全威胁不容忽视》,载《人民日报》2014年7月21日,第23版。
48.唐纳德·K.皮雷格夫:《打击跨国网络犯罪和网络恐怖主义中的国际合作》,卢建平等译,载《法学家》2003年第5期。
49.乌尔里希·希伯、方翌:《打击网络恐怖主义的国际合作》,会议论文2007年。
50.魏红、徐超:《浅析网络犯罪案件的刑事管辖权》,载《贵州社会科学》2006年第6期。
51.魏红、刘学文:《网络犯罪的形势及其对国际刑法的影响》,载《政治与法律》2007年第1期。
52.王立民:《反恐立法述评》,载《犯罪研究》2003年第1期。
53.许健:《论国际法之“人类共同利益”原则》,载《北京理工大学学报》2011年第5期。
54.夏春利:《外空国际法治理:现状与前景》,载《北京航空航天大学学报》2014年第1期。
55.夏勇:《我国学界对网络恐怖主义犯罪定义研究的综述》,载《法商研究》2004年第1期。
56.谢明刚:《网络恐怖主义探析》,载《中国公共安全(学术版)》2010年第2期。
57.徐杨:《论网络犯罪中证据的概念》,载《犯罪研究》2001年第1期。
58.许康定:《电子证据基本问题分析》,载《法学评论》2002年第3期。
59.解甦甦、王孔祥:《提供侵入、非法控制计算机信息系统程序、工具罪探析——〈网络犯罪公约〉与我国立法之比较》,载《人民司法》2014年第1期。
60.解甦甦、鲍祥:《〈网络犯罪公约〉与打击跨国网络犯罪的国际合作——兼评我国相关立法的规定〉,载《安徽警官职业学院学报》2007年第4期。
61.邢秀芬:《论网络犯罪的立法控制》,载《学术交流》2012年第8期。
62.郭旨龙等:《网络恐怖活动犯罪与中国法律应对——基于100个随机案例的分析和思考》,载《河南大学学报(社会科学版)》2015年第1期。
63.杨彩霞:《国际反网络犯罪立法及其对我国的启示——以〈网络犯罪公约〉为中心》,载《时代法学》2008年第6卷第3期。
64.杨正鸣:《网络犯罪概念论》,载《犯罪研究》2002年第2期。
65.杨玲:《欧洲的国家豁免立法与实践——兼及对中国相关立场与实践的反思》,载《欧洲研究》2011年第5期。
66.赵理海:《“人类共同继承财产”是当代国际法的一项重要原则》,载《北京大学学报》1987年第3期。
67.赵建文:《国际条约在中国法律体系中的地位》,载《法学研究》2010年第6期。
68.赵衍龙:《联合国:网络安全是全球挑战要由联合国来解决》,http://world.huanqiu.com/regions/2013-06/4070806.html,访问日期:2020年11月20日。
69.张杰、陈一鸣:《欧盟成立打击跨国网络犯罪中心》,载《人民日报》2012年3月29日,第21版。
70.张宗亮:《网络犯罪及国际社会法律对策》,载《东岳论丛》2004年第5期。
71.张新平:《试论网络犯罪刑事管辖权》,载张智辉主编:《国际刑法问题研究》,中国方正出版社2002年版。
72.张彩云:《网络犯罪中电子证据有关问题之探析》,载《当代法学》2003年第7期。
73.张阳:《新型网络犯罪的发案规律及立法对策》,载《公民与法》2014年第10期。
74.郑丽萍:《跨国性网络犯罪行为及其立法》,载《当代法学》2005年第2期。
75.周文:《欧洲委员会控制网络犯罪公约与国际刑法的新发展》,载《法学评论》2002年第3期。
76.赵延光:《论犯罪构成与罪名确定》,载《法学》1999年第5期。
77.赵秉志等:《计算机犯罪及其立法和理论之回应》,载《中国法学》2001年第1期。
78.邹晓玫、蔡玉千卉:《网络犯罪管辖权问题研究》,载《河南财经政法大学学报》2014年第3期。
(三)其他文献
1.澳门特别行政区行政长官办公室,第28/2013号行政长官公告,http://images.io.gov.mo/bo/ii/2013/30/avce-28-2013.pdf,访问日期:2020年11月17日。
2.第十二届联合国预防犯罪和刑事司法大会:《关于“应对全球挑战的综合战略:预防犯罪和刑事司法系统及其在不断变化的世界中的发展”的萨尔瓦多宣言草案》,http://www.un.org/zh/documents/view_doc.asp? symbol=A/CONF.213/L.6/REV.2,访问日期:2020年11月10日。
3.第三届世界互联网大会:《2016年世界互联网发展乌镇报告》,http://www.cac.gov.cn/2016-11/18/c_1119941092.htm,访问日期:2020年11月18日。
4.国际电信联盟:《发展中国家网络安全指南》,http://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2007-PDF-C.pdf,访问日期:2020年10月26日。
5.公安部反恐局:《公民防范恐怖袭击手册》,http://bj.bendibao.com/zffw/20141031/169340.shtm,访问日期:2020年10月30日。
6.公安部:《公民安全防范手册》,http://wenku.baidu.com/view/7d77f3996f1aff00bed51ea2.html,访问日期:2020年10月30日。
7.《黄惠康司长在网络问题布达佩斯国际会议上的发言》,载《中国国际法年刊(2012)》,法律出版社2013年版。
8.姜晨:《外交部就联大进行〈联合国全球反恐战略〉第4次评审等答问》,http://www.gov.cn/xinwen/2014-06/19/content_2704512.htm,访问日期:2020年11月16日。
9.孔晓涵:《联大审议信息社会世界峰会十周年成果》,http://www.cac.gov.cn/2015-12/16/c_1117484849.htm,访问日期:2020年11月15日。
10.联合国毒品和犯罪问题办公室:《关于将预防犯罪和刑事司法纳入更广泛的联合国议程以应对社会和经济挑战并促进国内和国际法治及公众参与的多哈宣言》,https://www.unodc.org/documents/congress/Declaration/V1504150_Chinese.pdf,访问日期:2020年11月9日。
11.世界互联网大会官网:《世界互联网再次烙下乌镇印记》,http://www.wicwuzhen.cn/system/2016/11/19/021373865.shtml,访问日期:2020年11月20日。
12.《习近平在第二届世界互联网大会开幕式上的讲话(全文)》,http://news.xinhuanet.com/politics/2015-12/16/c_1117481089.htm,访问日期:2020年11月22日。
13.中央网络安全和信息化领导小组:《国家网络空间安全战略》,http://www.cac.gov.cn/2016-12/27/c_1120195926.htm,访问日期:2020年10月28日。
14.中国驻维也纳联合国和其他国际组织代表团官网:《中国代表团出席“联合国网络犯罪问题政府间专家组”》,http://www.fmprc.gov.cn/ce/cgvienna/chn/drugandcrime/crime/t1018227.htm,访问日期:2020年10月18日。
15.中华人民共和国常驻联合国代表团官网:《中国代表团团长、常驻联合国副代表王民大使在联大信息社会世界峰会十周年成果审议高级别会议上的发言》,2015年12月25日,http://www.fmprc.gov.cn/web/dszlsjt_673036/ds_673038/t1324783.shtml,访问日期:2020年5月31日。
16.中华人民共和国常驻联合国代表团:《中国代表、外交部条法司司长徐宏在第69届联大六委关于“国际法委员会第66届会议工作报告”议题的发言》,http://www.china-un.org/chn/zgylhg/flyty/ldlwjh/t1207043.htm,访问日期:2020年3月15日。
17.中华人民共和国外交部官网:《中国和欧盟举行网络工作小组第二次会议》,2013年10月23日,http://www.fmprc.gov.cn/chn//gxh/mtb/sjhd/t1092143.htm,访问日期:2020年5月30日。
18.中华人民共和国外交部官网:《上海合作组织成员国元首关于国际信息安全的声明》,http://www.fmprc.gov.cn/web/wjb_673085/zzjg_673183/dozys_673577/dqzzoys_673581/shhz_673583/zywj_673595/t346576.shtml,访问日期:2020年9月1日。
19.中华人民共和国外交部官网:《上海合作组织成员国元首理事会议联合公报》,http://www.fmprc.gov.cn/web/wjb_673085/zzjg_673183/dozys_673577/dqzzoys_673581/shhz_673583/zywj_673595/t374690.shtml,访问日期:2020年9月3日。
20.中华人民共和国外交部和国家互联网信息办公室:《网络空间国际合作战略》,载《人民日报》2017年3月2日,第17版。
21.中华人民共和国国务院新闻办公室:《中国互联网状况》白皮书,http://www.scio.gov.cn/zxbd/tt/Document/1011194/1011194.htm,访问日期:2020年1月16日。
22.中国常驻维也纳联合国和其他国际组织代表团:《中国代表团出席联合国网络犯罪问题专家组首次会议并做发言》,http://www.fmprc.gov.cn/ce/cgvienna/chn/zxxx/t790751.htm,访问日期:2020年11月3日。
23.中国政府:《中国关于〈网络犯罪问题综合研究报告(草案)〉的评论意见》,https://www.unodc.org/documents/organized-crime/Cybercrime_Comments/Contributions_received/China.pdf,访问日期:2020年10月19日。
24.赵毛兵:《韩国儿童色情片全球第6可能致更多对儿童犯罪》,http://news.xinhuanet.com/world/2012-09/04/c_123668111.htm,访问日期:2020年10月25日。